0% found this document useful (0 votes)
26 views

Dual Access Control For Cloud

nice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Dual Access Control For Cloud

nice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Dual Access Control for Cloud-Based Data Storage and

Sharing
Dual Access Control for Cloud-Based Data
Project Title:
Storage and Sharing.
Implementation: Java,MYSQL

Cloud-based data storage service has drawn increasing interests from both academic and industry in the
recent years due to its efficient and low cost management. Since it provides services in an open
network, it is urgent for service providers to make use of secure data storage and sharing mechanism to
ensure data confidentiality and service user privacy. To protect sensitive data from being compromised,
the most widely used method is encryption. However, simply encrypting data (e.g., via AES) cannot fully
address the practical need of data management. Besides, an effective access control over download
request also needs to be considered so that Economic Denial of Sustainability (EDoS) attacks cannot be
launched to hinder users from enjoying service. In this paper, we consider the dual access control, in the
context of cloud-based storage, in the sense that we design a control mechanism over both data access
and download request without loss of security and efficiency. Two dual access control systems are
designed in this paper, where each of them is for a distinct designed setting. The security and
experimental analysis for the systems are also presented.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium i3 Processor
 Hard Disk : 500 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 2 GB

SOFTWARE REQUIREMENTS:
 Operating system : Windows 10.
 Coding Language : Java.
 Tool : Netbeans 8.2
 Database : MYSQL
iASK: A Distributed Q&A System Incorporating Social Community and
Global Collective Intelligence

ABSTRACT:

Traditional web-based Question and Answer (Q&A) websites cannot easily solve non-factual
questions to match askers’ preference. Recent research efforts begin to study social-based Q&A
systems that rely on an asker’s social friends to provide answers. However, this method cannot
find answerers for a question not belonging to the asker’s interests. To solve this problem, we
propose a distributed Q&A system incorporating both social community intelligence and global
collective intelligence, named as iASK. iASK improves the response latency and answer quality
in both the social domain and global domain. It uses a neural network based friend ranking
method to identify answerer candidates by considering social closeness and Q&A activities. To
efficiently identify answerers in the global user base, iASK builds a virtual server tree that
embeds the hierarchical structure of interests, and also maps users to the tree based on user
interests. To accurately locate the cooperative experts, iASK has a fine-grained reputation system
to evaluate user reputation based on their cooperativeness and expertise, and uses a reputation
based reward strategy to encourage users to be cooperative. To further improve the performance
of iASK, we propose a weak tie assisted social based potential answerer location algorithm and
an interest coefficient based uncategorized question forwarding algorithm. To further improve
the response quality and cooperativeness, we propose a reputation based reward strategy that
motivates users to answer questions from unknown users. Experimental results from large-scale
trace-driven simulation and real-world daily usages of the iASK prototype show the superior
performance of iASK. It achieves high answer quality with 24% higher accuracy, short response
latency with 53% less delay and effective cooperative incentives with 16% more answers
compared to other social-based Q&A systems. The results also show the effectiveness of the
enhancement algorithms in improving the performance of iASK.

EXISTING SYSTEM:

 Previous social network studies show that weak ties play a more dominant role in the
dissemination of information online than strong ties in social network. By limiting the
search scope to a user’s strong ties, it confines the Q&A activities within individual
social communities and prevents the knowledge sharing between different social
communities.
 Morris et al. studied the answer quality and response speed of questions asked through
status messages in an online social network as well as how to format questions in order to
improve the performance. By posting questions on the status wall, a user can broadcast
the questions to all of his/her friends.
 Harper et al. investigated the question quality predictors, and found that the reward
strategy and community networks lead to better answer quality. The works are
centralized based systems that identify the most appropriate friends of a user to answer
his question.

DISADVANTAGES OF EXISTING SYSTEM:


 They cannot easily solve non-factual questions, because followers are unaware of their
followees’ personnel preferences. The non-factual questions here mean the questions
without specific correct answers, such as questions about opinion or suggestion.
 Due to the anonymous global users, a question may not receive answers or the response
delay may be long, and the provided answers may not be trustable (such as spam) or
accurate.

PROPOSED SYSTEM:

 We propose a unified system that incorporates social community intelligence and global
collective intelligence into a single distributed Q&A system, named as iASK.
 Compared to other social-based Q&A systems, iASK is the first work that uses the global
collective intelligence to complement the social community intelligence in order to
efficiently and accurately locate potential answerers outside the asker’s social
communities.
 When an answer cannot be found within the social network of an asker, it is forwarded to
the global user base. iASK does not simply combine the previously proposed social-
based Q&A system and global Q&A website platform. It improves the response latency
and answer quality (trust and accuracy) in both the social domain and global domain.
 A Q&A system structure that incorporates both social community and global collective
intelligences, which complement each other in potential answerer search.
 A fine-grained reputation system that accurately locates cooperative global experts to
answer questions.
 An interest coefficient based uncategorized question forwarding algorithm that forwards
a question to the users that can better categorize the interest of a question when the
question’s asker has limited knowledge to identify the interest of the question.

ADVANTAGES OF PROPOSED SYSTEM:

 iASK has a fine grained reputation system to evaluate user reputation based on their
cooperativeness and expertise, and a reputation based reward strategy.
 Accurate response. It further provides users the flexibility to choose candidates based on
their preference priorities on different factors.
 A virtual server tree in the central servers to efficiently locate answerer candidates in the
global user base. Each virtual server manages users in a fine-grained interest and is
responsible for locating the answerer candidates in this interest.
 A reputation-based reward strategy that encourages global experts to be cooperative. A
higher reward for answerers with a higher reputation motivates users to be cooperative in
question responding.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.

 Hard Disk : 120 GB.

 Monitor : 15’’ LED

 Input Devices : Keyboard, Mouse

 Ram : 1 GB

SOFTWARE REQUIREMENTS:

 Operating system : Windows 7.


 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

NetSpam: a Network-based Spam Detection Framework for Reviews in


Online Social Media

ABSTRACT:
Nowadays, a big part of people rely on available content in social media in their
decisions (e.g. reviews and feedback on a topic or product). The possibility that
anybody can leave a review provide a golden opportunity for spammers to write
spam reviews about products and services for different interests. Identifying these
spammers and the spam content is a hot topic of research and although a
considerable number of studies have been done recently toward this end, but so far
the methodologies put forth still barely detect spam reviews, and none of them
show the importance of each extracted feature type. In this study, we propose a
novel framework, named NetSpam, which utilizes spam features for modeling
review datasets as heterogeneous information networks to map spam detection
procedure into a classification problem in such networks. Using the importance of
spam features help us to obtain better results in terms of different metrics
experimented on real-world review datasets from Yelp and Amazon websites. The
results show that NetSpam outperforms the existing methods and among four
categories of features; including review-behavioral, user-behavioral, review
linguistic, user-linguistic, the first type of features performs better than the other
categories.

EXISTING SYSTEM:

 Existing system techniques can be classified into different categories; some


using linguistic patterns in text which are mostly based on bigram, and
unigram, others are based on behavioral patterns that rely on features
extracted from patterns in users’ behavior which are mostly meta data based
and even some techniques using graphs and graph-based algorithms and
classifiers.
 Existing system can be summarized into three categories: Linguistic-based
Methods, Behavior-based Methods and Graph-based Methods.
 Feng et al. use unigram, bigram and their composition. Other studies use
other features like pairwise features (features between two reviews; e.g.
content similarity), percentage of CAPITAL words in a reviews for finding
spam reviews.
 Lai et al. used a probabilistic language modeling to spot spam. This study
demonstrates that 2% of reviews written on business websites are actually
spam.
 Deeper analysis on literature show that behavioral features work better than
linguistic ones in term of accuracy they yield.

PROPOSED SYSTEM:
 The general concept of our proposed framework is to model a given review
dataset as a Heterogeneous Information Network (HIN) and to map the
problem of spam detection into a HIN classification problem.
 In particular, we model review dataset as a HIN in which reviews are
connected through different node types (such as features and users). A
weighting algorithm is then employed to calculate each feature’s importance
(or weight). These weights are utilized to calculate the final labels for
reviews using both unsupervised and supervised approaches.
 We propose NetSpam framework that is a novel network based approach
which models review networks as heterogeneous information networks. The
classification step uses different metapath types which are innovative in the
spam detection domain.
 A new weighting method for spam features is proposed to determine the
relative importance of each feature and shows how effective each of features
are in identifying spams from normal reviews.
 NetSpam improves the accuracy compared to the state of- the art in terms of
time complexity, which highly depends to the number of features used to
identify a spam review; hence, using features with more weights will
resulted in detecting fake reviews easier with less time complexity.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

 System : Pentium Dual Core.

 Hard Disk : 120 GB.

 Monitor : 15’’ LED

 Input Devices : Keyboard, Mouse

 Ram : 1 GB

SOFTWARE REQUIREMENTS:

 Operating system : Windows 7.


 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL
Forward Secure Public Key Encryption with Keyword
Search for Outsourced Cloud Storage
IEEE BASE PAPER ABSTRACT:
Cloud storage has become a primary industry in remote data management service but also
attracts security concerns, where the best available approach for preventing data disclosure is
encryption. Among them the public key encryption with keyword search (PKSE) is considered to
be a promising technique, since clients can efficiently search over encrypted data files. That is, a
client first generates a search token when to query data files, the cloud server uses the search
token to proceed the query over encrypted data files. However, a serious attack is raised when
PKSE meets cloud. Formally speaking, the cloud server can learn the information of a newly
added encrypted data file containing the keyword that previously queried by using the search
tokens it has received, and can further discover the privacy information. To address this issue, we
propose a forward secure public key searchable encryption scheme, in which a cloud server
cannot learn any information about a newly added encrypted data file containing the keyword
that previously queried. To better understand the design principle, we introduce a framework for
constructing forward secure public key searchable encryption schemes based on attribute-based
searchable encryption. Finally, the experiments show our scheme is efficient.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium i3 Processor
 Hard Disk : 500 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 4 GB

SOFTWARE REQUIREMENTS:
 Operating system : Windows 10.
 Coding Language :
 Tool : Netbeans 8.2
 Database : MYSQL
Lightweight and Expressive Fine-Grained Access Control
for Healthcare Internet-of-Things
IEEE BASE PAPER ABSTRACT:
Healthcare Internet-of-Things (IoT) is an emerging paradigm that enables embedded devices to
monitor patients vital signals and allows these data to be aggregated and outsourced to the cloud.
The cloud enables authorized users to store and share data to enjoy on-demand services.
Nevertheless, it also causes many security concerns because of the untrusted network
environment, dishonest cloud service providers and resource-limited devices. To preserve
patients’ privacy, existing solutions usually apply cryptographic tools to offer access controls.
However, fine-grained access control among authorized users is still a challenge, especially for
lightweight and resource-limited end-devices. In this paper, we propose a novel healthcare IoT
system fusing advantages of attribute-based encryption, cloud and edge computing, which
provides an efficient, flexible, secure fine-grained access control mechanism with data
verification in healthcare IoT network without any secure channel and enables data users to
enjoy the lightweight decryption. We also define the formal security models and present security
proofs for our proposed scheme. The extensive comparison and experimental simulation
demonstrate that our scheme has better performance than existing solutions.

PROJECT OUTPUT VIDEO:


SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium i3 Processor
 Hard Disk : 500 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 4 GB

SOFTWARE REQUIREMENTS:
 Operating system : Windows 10.
 Coding Language :
 Tool : Netbeans 8.2
 Database : MYSQL

You might also like